dc.contributor.author | Sartonen, Miika | |
dc.contributor.author | Huhtinen, Aki-Mauri | |
dc.contributor.author | Lehto, Martti | |
dc.date.accessioned | 2022-08-19T09:23:49Z | |
dc.date.available | 2022-08-19T09:23:49Z | |
dc.date.issued | 2016 | |
dc.identifier.citation | Sartonen, M., Huhtinen, A.-M., & Lehto, M. (2016). Rhizomatic Target Audiences of the Cyber Domain. <i>Journal of Information Warfare</i>, <i>15</i>(4), 1-13. <a href="https://www.jinfowar.com/subscribers/journal/volume-15-issue-4/rhizomatic-target-audiences-cyber-domain" target="_blank">https://www.jinfowar.com/subscribers/journal/volume-15-issue-4/rhizomatic-target-audiences-cyber-domain</a> | |
dc.identifier.other | CONVID_26531553 | |
dc.identifier.other | TUTKAID_72893 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/82722 | |
dc.description.abstract | Target Audience Analysis (TAA) is a process of finding suitable target audiences for psychological operations (PSYOPS). Typically, a TAA is a one-way process with some kind of a feedback system. The cyber domain presents a challenge to this type of sequential, linear process by refusing to stay still while the process is being executed, possibly leading to results from yesterday’s data in an environment that no longer exists today. Another challenge is that identifiable human beings—the traditional targets of PSYOPS—are not the only inhabitants of the cyber domain. Physical devices, nicknames, IP addresses, networks, and a vast amount of data populate this environment, in which there are no human beings, only their presentations and behavioural residue in a multitude of forms. The authors argue that while the psychological theories behind influence operations still form the basis for PSYOPS as a whole, a re-thinking of methods is necessary for the cyber domain. To conceptualize the cyber domain as a platform for influence operations, the authors suggest a five-layer structure based on Martin C. Libicki’s model. In each of these five layers, the target audiences are present in different forms. Thus, all information between humans is filtered through all of the layers with their own rules and causalities. In order to be successful in any influence attempt, one must understand and utilize the characteristics of each layer. The authors also propose that the rhizome theory is the most effective theoretical approach for understanding the complex interactions within the cyber domain. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Peregrine Technical Solutions, LLC | |
dc.relation.ispartofseries | Journal of Information Warfare | |
dc.relation.uri | https://www.jinfowar.com/subscribers/journal/volume-15-issue-4/rhizomatic-target-audiences-cyber-domain | |
dc.rights | In Copyright | |
dc.subject.other | Cyber Domain | |
dc.subject.other | Psychological Operations | |
dc.subject.other | Rhizome | |
dc.subject.other | Social Media | |
dc.subject.other | Target Audience | |
dc.title | Rhizomatic Target Audiences of the Cyber Domain | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202208194261 | |
dc.contributor.laitos | Tietotekniikan laitos | fi |
dc.contributor.laitos | Department of Mathematical Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 1-13 | |
dc.relation.issn | 1445-3312 | |
dc.relation.numberinseries | 4 | |
dc.relation.volume | 15 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © Peregrine Technical Solutions, LLC, 2016 | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | sosiaalinen media | |
dc.subject.yso | informaatiosodankäynti | |
dc.subject.yso | Internet | |
dc.subject.yso | kyberavaruus | |
dc.subject.yso | verkkotunnukset | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p20774 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p8874 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p20405 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7989 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p10186 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |